MASON ECE 646 - Analysis of Enterprise VPNs (8 pages)

Previewing pages 1, 2, 3 of 8 page document View the full content.
View Full Document

Analysis of Enterprise VPNs



Previewing pages 1, 2, 3 of actual document.

View the full content.
View Full Document
View Full Document

Analysis of Enterprise VPNs

107 views

Problems/Exams


Pages:
8
School:
George Mason University
Course:
Ece 646 - Cryptography and Computer Network Security
Cryptography and Computer Network Security Documents

Unformatted text preview:

ECE 646 CRYPTOGRAPHY AND COMPUTER NETWORK SECURITY 1 Analysis of Enterprise VPNs Arif Basha Abstract Throughout today s highly global market place remote access to a network is imperative Towards that goal there have been many options over the years from which customers could choose Recently two Virtual Private Network VPN technologies have proved to be most beneficial for enterprise customers They are Internet Protocol Security IPSec and Secure Sockets Layer SSL SSL has evolved in recent years and has been gaining steady momentum and luring customers away from the traditional IPSec networks This paper compares these two technologies and attempts to clarify the cloud of confusion surrounding these technologies Index Terms Virtual Private Networks Internet protocol Security Secure Sockets Layer Wireless Networks infrastructure seamlessly minimize administration time for network administrators provide audit control be scalable as the enterprise grows and be able to deploy in high availability mode II OPEN SYSTEMS INTERCONNECTION OSI MODEL The OSI reference model was developed by the International Organization for Standardization ISO A layered architectural model Figure 1 provides a common frame of reference for discussing Internet communications It is used not only to explain communication protocols but to develop them as well It separates the functions performed by communication protocols into manageable layers stacked on top of each other Each layer in the stack performs a specific function in the process of communicating over a network I INTRODUCTION S with the advent of networking technologies enterprise IT departments have had to balance two seemingly mutually exclusive mandates open access to corporate applications and resources and provide stronger access control and security Hence almost all companies have some sort of remote access solutions in place so corporate network resources are convenient and available when necessary In the early 1990 s there were only



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Analysis of Enterprise VPNs and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Analysis of Enterprise VPNs and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?